Research Article

Traceable Attribute-Based Secure Data Sharing with Hidden Policies in Mobile Health Networks

Figure 7

Time costs of different phases. (a) Encryption time. (b) Decryption time. (c) GenToken time.
(a)
(b)
(c)